Showing 7,221 - 7,240 results of 10,771 for search 'Big3~', query time: 2.39s Refine Results
  1. 7221

    Optimal Sizing of a Hybrid Renewable Photovoltaic-Wind System-Based Microgrid Using Harris Hawk Optimizer by Abdullrahman A. Al-Shamma’a, Hassan M. Hussein Farh, Abdullah M. Noman, Abdullah M. Al-Shaalan, Abdulaziz Alkuhayli

    Published 2022-01-01
    “…The efficacy of HHO is investigated, and its performance was compared with seven metaheuristic techniques, grasshopper optimization algorithm (GOA), cuckoo search optimizer (CSO), genetic algorithm (GA), Big Bang–Big Crunch (BBBC), coyote optimizer, crow search, and butterfly optimization algorithm (BOA), to attain the HRE microgrid optimal sizing based on annualized system cost (ASC) reduction. …”
    Get full text
    Article
  2. 7222

    An Enhanced Semisteady-State Jaya Algorithm With a Control Coefficient and a Self-Adaptive Multipopulation Strategy by Joshua Churchill Ankrah, Francis Boafo Effah, Elvis Twumasi

    Published 2025-01-01
    “…When compared with the Snow Geese Algorithm (SGA), Big Bang–Big Crunch Algorithm (BBBCA), firefly algorithm (FA), bat algorithm (BA), cuckoo search algorithm (CSA), and flower pollination algorithm (FPA), the ESJaya algorithm gives competitive results in terms of obtaining optimum values, mean accuracy, and stability. …”
    Get full text
    Article
  3. 7223
  4. 7224

    Trends in InsurTech Development in Korea: A News Media Analysis of Key Technologies, Players, and Solutions by Yongsu Lee, Hyosook Yim

    Published 2025-01-01
    “…First, regarding changes in InsurTech technology, blockchain and the Internet of Things initially garnered significant attention, but artificial intelligence and big data later emerged as more critical technologies. …”
    Get full text
    Article
  5. 7225

    Review of cryptographic application security evaluation techniques for new critical infrastructures by Gaolei LI, Jianhua LI, Zhihong ZHOU, Hao ZHANG

    Published 2023-12-01
    “…The construction of new critical infrastructure, represented by high-speed full-time signal coverage, intelligent and fine-grained urban management, and deep space and deep sea scientific innovation experimental fields, has entered a new stage with the deep integration and development of new technologies such as 5G/6G, artificial intelligence, and blockchain in various fields.The security evaluation of cryptography applications, as a key technological resource for ensuring the security of national information, integration, and innovation infrastructure, has risen to the level of international law and national development strategy.It is urgent to construct a comprehensive, fine-grained, and self-evolving cryptography security evaluation system throughout the data lifecycle.The typical APT attacks and ransomware attacks faced by new critical infrastructure in industries such as energy, medicine, and transportation in recent years were considered.And then the growing demand for security evaluation of cryptography applications was analyzed in the face of new business requirements such as preventing endogenous data security risks, achieving differentiated privacy protection, and supporting authenticated attack traceability.The new challenges were also examined, which were brought by new information infrastructure (including big data, 5G communication, fundamental software, etc.), integration infrastructure (including intelligent connected vehicles, intelligent connected industrial control systems, etc.), and innovation infrastructure (including big data, artificial intelligence, blockchain, etc.) to the security evaluation of cryptography applications.Furthermore, the new requirements were revealed about domestically produced cryptography algorithms and protocols deployed on high-performance computing chips, ultra-high-speed communication modules, and large-capacity storage media for cryptography application security evaluation technology.Finally, the development of automated and intelligent cryptography application security evaluation technology was explored.…”
    Get full text
    Article
  6. 7226

    ENHANCING ACCOUNTABILITY FOR MAKING CITIES RESILIENT AND ROLE OF SUPREME AUDIT INSTITUTIONS by Arife Coşkun, Latif Gürkan Kaya

    Published 2017-06-01
    “…Asknown, the programs and projects related to making cities resilient are mostlylong- term and require big budgets. Implementing the long-term programs andprojects requiring a big budget financed by multi-stakeholders can be carriedout in a transparent manner. …”
    Get full text
    Article
  7. 7227

    New Media Marketing Strategy Optimization in the Catering Industry Based on Deep Machine Learning Algorithms by Zikang Peng

    Published 2022-01-01
    “…The era of unreachable big data has arrived, which raises questions for the development of corporate marketing. …”
    Get full text
    Article
  8. 7228

    Study on the Relationship between Pore Structure and Uniaxial Compressive Strength of Cemented Paste Backfill by Using Air-Entraining Agent by Fengwen Zhao, Jianhua Hu, Dongjie Yang, Ye Kuang, Hongxing Xiao, Minghua Zheng, Xueliang Wang

    Published 2021-01-01
    “…With the increase in AEA content, the total pore volume of different pore sizes in AEACPB increases, in which the proportion of big and medium pore gradually increases while the proportion of small pore gradually decreases. …”
    Get full text
    Article
  9. 7229

    Teacher’s Challenges towards Online Learning in Pandemic Era by Elsa Rosalina, Nasrullah Nasrullah, Eka Puteri Elyani

    Published 2020-12-01
    “… The teaching and learning process has a big revolution since Corona Virus Disease 19 (COVID19) has spread out to the world. …”
    Get full text
    Article
  10. 7230

    Road Traffic Safety Risk Estimation Method Based on Vehicle Onboard Diagnostic Data by Xiaoyu Cai, Cailin Lei, Bo Peng, Xiaoyong Tang, Zhigang Gao

    Published 2020-01-01
    “…In this study, the correlations between high-incidence locations for aberrant driving behaviors and locations of road traffic accidents are analyzed based on vehicle OBD data. …”
    Get full text
    Article
  11. 7231

    Bridging the Maturity Gaps in Industrial Data Science: Navigating Challenges in IoT-Driven Manufacturing by Amruta Awasthi, Lenka Krpalkova, Joseph Walsh

    Published 2025-01-01
    “…The importance of including stakeholders in the data review process to enhance the data quality is accentuated in this paper, specifically when big data analysis is to be integrated into corporate strategies. …”
    Get full text
    Article
  12. 7232

    Monte Carlo Algorithm For Matrices in Solving Systems of Linear Equations, Determinants, Inverse, Eigen Values, and Eigenvectors. by Bamwine, Delik

    Published 2024
    “…This research provides me with a solid base of knowledge in numerical linear algebra for parallel high-performance computing systems. Future research should focus on enhancing sampling efficiency in matrix-vector products along MCGMRES iterations and implementing the RSVD algorithm on big data analysis platforms.…”
    Get full text
    Thesis
  13. 7233
  14. 7234

    Cytokines in Pericardial Effusion of Patients with Inflammatory Pericardial Disease by Konstantinos Karatolios, Rainer Moosdorf, Bernhard Maisch, Sabine Pankuweit

    Published 2012-01-01
    “…Conclusions. VEGF and bFGF levels in pericardial effusion are elevated in patients with inflammatory PE. …”
    Get full text
    Article
  15. 7235

    Fuzzy Logic-Based Arrival Time Estimation for Indoor Navigation Using Augmented Reality by Muhammad Hidayat Mohammed Sohif, Muhammad Imran Mardzuki, Azhar Mohd Ibrahim, Ahmad Jazlan

    Published 2025-01-01
    “…Algoritma ini mengambil pecutan telefon dalam arah x dan z sebagai input dan menggunakan fungsi keahlian berbentuk segi tiga bagi pemboleh ubah masuk dan keluar. Dapatan eksperimen menunjukkan kebolehan menggunakan logik kabur bagi menganggarkan masa ketibaan bagi navigasi dalaman, dengan kesilapan anggaran purata sebanyak 5.82%. …”
    Get full text
    Article
  16. 7236

    21ST INTERNATIONAL CONFERENCEON STATISTICAL SCIENCES by Abdur Rasheed

    Published 2024-12-01
    “…The three-day conference, held from December 9 to 11, 2024, brought together renowned experts, researchers, and students worldwide to discuss the theme "Mobilizing Data Science & Big Data to Achieve SDGs." …”
    Get full text
    Article
  17. 7237

    Joseph Delteil à la recherche de l’Occitanie by Hervé Terral

    Published 2021-11-01
    “…Joseph Delteil (1894-1978), a French-speaking writer from Aude, claims to have been born in Villar-en-Val (Aude) in the garrigue (more likely in a village bedroom), a few dozen kilometers from the Big Blue. At various times in his work, Delteil set out regular milestones for understanding the "Midi", whose different facets he explored in terms of both landscape and history.…”
    Get full text
    Article
  18. 7238

    La corrupción en España: rasgos y causas esenciales by Manuel Villoria

    Published 2016-01-01
    “…This kind of corruption is frequently highlighted by the media and linked to the economic problems of the country, mainly unemployment, creating a big problem of disaffection and distrust in our political institutions.…”
    Get full text
    Article
  19. 7239

    Le corpus de poésie dite « populaire » comme matériau de recherche pour les sciences humaines et sociales by Youcef Djedi

    Published 2016-06-01
    “…In some qacida-s are kept yet the contents of some important theological and cutural disputes and the marks of big political events.…”
    Get full text
    Article
  20. 7240

    QUIET REVOLUTION IN THE ORGANIZATION OF BRANCHES by A. Berkaeva

    Published 2016-05-01
    “…Economic and geopolitical crises have changed priorities in behavior of competitive firms and possession of a big share of today's market. It isn't the key to success in the future any more. …”
    Get full text
    Article